Mac boot ROM virus is real

WARNING:

If you are of the school that macs can't get viruses (despite Apple's security updates designed to protect against them) and do not wish to be disillusioned (yet...), please skip this post. For those of you on the frontlines: has ANYONE successfully overwritten the boot rom? Via a USB port, my computer was infected. A wipe with 7 pass zeroing and internet-only reinstall fails to erase virus, revealing that it is indeed at the boot rom level. Apple security updates and El Capitan securities, designed to protect EFI vulnerabilities, can supposedly close this barn door but, in my case, the horse has already escaped. My next step is trashing this now-bricked machine and repurchasing. I'd love to hear from anyone who has encountered this and has a boot rom fix or can do some brainstorming!

Recap: erased with 7-pass. Re-partioned. Clean, internet-only install (no peripherals). Security updates, upgraded to El Capitan. Hijacks persist.


<Edited By Host>

Posted on Nov 15, 2015 1:03 AM

Reply
16 replies

Nov 15, 2015 8:37 AM in response to Res_Q

What are the symptoms of this particular infestation?

If you've erased the entire disk and reloaded OS X from a known-good download, and have not reloaded any files nor applications from the corrupt environment, then there's another path — maybe the network, and via compromised credentials — or there's a problem with one or more of the lower-level firmware-based devices somewhere within the system.


If the minimal OS X system installation — network disconnected, no external devices, etc — is showing a breach after the typical recovery processing, then you will want to contact Apple Support and request assistance from them, or — if they're not interested — you might seek assistance from folks that specialize in security as they might want to get a look at this system and at the USB device involved. If  is not, then maybe communicate this breach among the reputable parts of the security community, and with a clear statement of the exact problems and with the exact details of what steps were (unsuccessfully) performed to try to remediate this, and with details such as the boot ROM and SMC versions included.

FWIW, multiple-pass erasure is not particularly effective with SSDs — SSDs don't work the same way that hard disks do — and is not going to be particularly better than one-pass erasure in this particular case, as this isn't an issue of avoiding data remanence in the storage devices. Multi-pass erasure addresses only data remanence — which is not at issue, here — and only with specific classes of storage devices.

Nov 16, 2015 12:56 AM in response to VikingOSX

Internet download from Apple through recovery mode. Zero peripherals. All other devices removed from wifi service through provider router settings. And this on a machine that was erased with a 7-pass zero-ing. Hard drive re-partioned, verified. And no sooner do I create my computer's user name on the fresh-download, then the virus begins locking settings, etc. In moments I am hijacked and the virus has full-control. It is absolutely below the OS. At this point I am out of ideas and waiting for someone smarter than me to solve it and post. Can't even re-sell the machine (except to a non-believer in root viruses! ... Lol, just kidding, put away the torches...).


It is below the OS and it's a MacBook. Yup. No way around this truth.

Nov 19, 2015 1:10 AM in response to MrHoffman

I believe I have located the virus files, at least some of them.

As I am working in Internet Recovery mode, I am unable to cut and paste text, as activating safari terminates terminal. But diskutil reveals /dev/disk0 amd /dev/disk2.

ls - d - Rv /dev/disk0 reveals /dev/disk0 only. The same command utilizing .?* reveals the additional directories (..) and (.forward).

ls -d - Rv /dev/disk2 reveals /dev/disk2 only. The same command utilizing .?* reveals the additional directories (..) and (.forward).

ls -a -Rv .?* /dev/disk0 revealed the same exact contents as /dev/disk/2.

But ls -a -Rv .?* (no device/disk path) revealed (.DS_Store) and (.file). I can't find a way to open (.file), but this file only appeared (in various places throughout Finder) after infection. Further scrolling revealed recursive entry ./Library, which revealed entries of files that I have seen while under "attack."

ls -a -Rv revealed (.), (..), (.forward), (Library). Within both (./usr) and (../usr) directories was /standalone i386/EfiLoginUI, containing:

guest-userUI.efires (which kept appearing in console as the virus took control of certain functions), as well as (..private/etc/mach_init_per_user.d), (unknown_userUI.efires), as well as an "appleImage application" that always popped up (after every wipe and install) just before the virus regained control.


There IS a question in here - to what area is -Bash.3.2# ls -a -Rv .?* (NO PATH ENTERED) when working in Internet Recovery mode after disk erase and proor to re-installation of OS, and how to delete suspicious files in the same environment?

Nov 17, 2015 6:08 AM in response to Res_Q

lsof is a command that can list open files and open network channels, and is not particularly related to with the non-volatile storage used for the system firmware, nor for the device firmware. When OS X or some other Unix system is running, there'll be more than a few channels open, too.


If you want to discuss those files you're seeing, then we'll need to know the specific commands used, and a brief sample of some of the files and particularly the directories that are visible. So long as OS X is booted, I'd expect those files and channels shown by lsof to be the booted operating system, too.


The following will list the devices present, and the second command will — when provided with the name of a disk device, with the complete name being /dev/disk0 or /dev/disk1, for instance — show the GPT partitioning structures for the device. This obviously assumes the disk is GPT partitioned. Most OS X boot disks are.


$ diskutil list

$ sudo gpt list /dev/disk{unit}


Depending on the exact commands used to erase the disks and the specific disk configuration — specific details matter here — you could well be looking at the UEFI partition or the recovery partition. That's not the system firmware.


The Internet recovery mechanisms do involve more than a few files, as does a local boot from an external bootable USB device — the latter is fairly common for erasing devices, but it's the other disks that get erased and not the local (usually external) boot device that's being used to perform the erasure.

Nov 19, 2015 9:03 PM in response to Res_Q

Without the sequences and commands used to erase and install here, I'm left to guess as to what happened here. I don't know which Mac is involved here, either — some of these have internet recovery and which can sometimes be useful here, and some do not.


If the whole disk was erased and reformatted, there should be nothing on the system — beyond the pieces and parts associated with the file system structures — that was not then installed.


In general, boot from a locally-created USB boot disk, preferably created on a separate system, and using a new-to-you or new-to-the-target-system (ad disposable) USB device. Boot and use that to access the problematic disk.


If you want to know where you are currently defaulted to within the file system, use the pwd command.


Use the cd command to change the default.


EfiLoginUI is part of OS X.


Finding a .DS_Store file in various directories is expected, after a user of Finder has visited the directory.


The . and .. files (directories) are normal.


If the current default directory is /, then the ./Library path is not recursive.


With the ls command, the -a switch shows leading-dot "hidden" files, if the current user is not root or not sudo — where it's the default on ls.


The /etc/mach_init.d and /etc/mach_init_per_user.d directories are associated with some long-deprecated startup customization processing. That'd be worth a look, and compare that with what's present on a known-good system. (But again, a complete disk erasure — not a partition-level erasure — should remove all directories and all files on the target disk. You'll need that USB boot disk mentioned above, here.)


Get somebody to look at this box. Trying to do any sort of forensics via forum postings is far more time and effort. I'd probably image the whole disk somewhere to start; to create a complete copy of the whole disk. Then get somebody to look at it, as well as at at the USB device that reportedly was involved here. Or if you want to pursue this investigation yourself, there is an OS X internals book and at least one book on file system forensics does include some OS X file system info, and you can start reading. If you are unfamiliar with the general topic, Apple has a shell scripting primer available, too.

Nov 16, 2015 1:01 AM in response to Res_Q

It is not a SS hard drive. It's a Macbook Pro, mid 2012. Clean download. No devices on router and router did not infect any other device in house. My log in credentials as in email and iTunes/iCloud are the same device-wide. My OS login was changed with each fresh attempt. Still, can't beat this mofo.

Nov 16, 2015 8:32 AM in response to Res_Q

Contact Apple. Further discussions here will not be fruitful, as there's no documented user-level access to the firmware.


If Apple is not interested — a lack of interest here seems rather unlikely, based on your description — then selling this box does seem possible — there are folks that will be interested in this box, and in that USB device.

Nov 17, 2015 2:42 AM in response to MrHoffman

Hmmm - user-level access to ROM? I have recently, after yet another disk erasure entered Terminal via Internet-Recovery interface, and ran "lsof." The disks are empty, and yet hundreds of files were visible. I believe I am looking at the ROM, not sure what else it could be. Many of the files look typical - some looked quite suspicious. Has anyone done this and can confirm or deny whether this is, indeed, ROM access? If so, what's to stop users (me, in this case ) from deleting confirmed malware?

Nov 19, 2015 9:03 PM in response to MrHoffman

Yes, I do know that a complete erasured (with 7 pass zeroing) and a reformat SHOULD have erased everything. And the files I am seeing I am looking at BEFORE re-installing the system software! This is quite a challenge. I did bring it to the Apple store, btw, where a "GENIUS" (world's best job title, ever!) told me that they are not trained to read system files, lol). Thank you for your suggestions - every clue brings me a little closer to eradicating this sinister entity. 👿

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Mac boot ROM virus is real

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.